War in the 21St Century and Collected Works

Total Page:16

File Type:pdf, Size:1020Kb

War in the 21St Century and Collected Works Penn State Journal of Law & International Affairs Volume 5 Issue 1 War in the 21st Century and Collected Works April 2017 War in the 21st Century and Collected Works ISSN: 2168-7951 Recommended Citation War in the 21st Century and Collected Works, 5 Penn. St. J.L. & Int'l Aff. (2017). Available at: http://elibrary.law.psu.edu/jlia/vol5/iss1/1 The Penn State Journal of Law & International Affairs is a joint publication of Penn State’s School of Law and School of International Affairs. Penn State Journal of Law & International Affairs 2016 – 2017 FACULTY EDITORIAL BOARD Faculty Advisor Beth Farmer Larry Backer Johannes W. Fedderke Scott Sigmund Gartner John A. Kelmelis Sophia McClennen Catherine A. Rogers STUDENT EDITORIAL BOARD Editor-in-Chief Roger Z. Bollman Managing Editor Managing Editor Managing Editor of Articles of Communications of Student Work Cammann Piasecki Neeraj Kumar Nick Weiss Articles Editors Managing Editor Student Work Editors Thomas F. Brier, Jr. of Research Ryan Dickinson Elizabeth Kramer Tanner Beck Angelo E. Mancini Nicholas A. Maskrey Cierra Vaughn Britton Shields EDITORIAL STAFF Senior Editors Tammi Blackburn Max Greer Rachel Sherman Bridget Brainard Mary A. Philippus Chris Striker Christian R. Burne Jordan H. Washam Andrew Carroll Kaitlyn R. Utkewicz Associate Editors Rachel-Rebekah Brown Christie Huang Ayona Riley Carlos Briggs Camandang Anthony J. Jensen Joseph Ruth Todd J. Ciancarelli Catherine S. Kellogg Daniel J. Sawey Timothy J. Cloud William J. Klena Kate Tierney Tyler J. Dunphy Andy Low Brian Finneran Brian Finneran Ben McGiffin Chelsea Wilson Prajakta R. Gupte Allison Muck Julie Wortham John G. Himes Elva Perales Mara Zrzavy DOCUMENT2 (DO NOT DELETE) 4/27/2017 Penn State Journal of Law & International Affairs 2017 VOLUME 5 NO. 1 THE CYBER LONGBOW & OTHER INFORMATION STRATEGIES: U.S. NATIONAL SECURITY AND CYBERSPACE Gary D. Brown* * Gary D. Brown is a retired U.S. Air Force Judge Advocate. He served as U.S. Cyber Command's first senior legal counsel. DOCUMENT2 (DO NOT DELETE) 4/27/2017 2017 Penn State Journal of Law & International Affairs 5:1 TABLE OF CONTENTS I. INTRODUCTION ........................................................................ 3 II. BACKGROUND ........................................................................... 3 III. RIVAL APPROACHES TO CYBERSPACE ............................. 5 A. China ..................................................................................... 5 B. ISIS ........................................................................................ 7 C. Russia .................................................................................. 13 IV. A WAY FORWARD .................................................................... 20 V. CHALLENGES ........................................................................... 23 VI. CONCLUSION ............................................................................ 26 2 DOCUMENT2 (DO NOT DELETE) 4/27/2017 2017 Brown 5:1 I. INTRODUCTION The U.S. is struggling to effectively contest its adversaries in cyberspace. It would seem natural for the U.S. to be the leader in every aspect of internet operations, after all, the internet was invented in the U.S., and the U.S. is dominant in many areas. However, there are regions of cyberspace in which the U.S. is not the leader, perhaps because of a misapprehension about the nature of cyberspace.1 This paper will provide a definition of cyberspace suitable for national security strategy discussions and address how the U.S. should approach cyberspace operations to engage its adversaries in the most effective manner. Historically, the U.S. has been a champion at leveraging soft power. Cyberspace has become an essential way to increase the reach and penetration of soft power, yet the U.S. appears on some levels to be losing in cyberspace to non- state groups like ISIS and to other State actors such as Russia. This paper suggests that it would be more effective to think of cyberspace as a combination of infrastructure (the internet) and the information and ideas that move across the infrastructure (the ideosphere, as defined below). This model of cyberspace helps increase the emphasis on engaging with the actors and information using the internet in ways counter to U.S. national interests. II. BACKGROUND Cyberspace is an unprecedented national security challenge. It doesn’t align with standard U.S. government organizational constructs, which are generally either geographic or defined by specific functionality. Although it is hosted on physical infrastructure that has a physical location, it’s often not helpful to think of cyberspace in geographic terms. Additionally, it’s not straightforward to characterize it functionally because cyber capabilities support every 1 At least one author rejects the notion that cyberspace can even have a nature. This may reflect the definitional problem discussed below. See Lawrence Lessig, Code and Other Laws of Cyberspace (1999). 3 DOCUMENT2 (DO NOT DELETE) 4/27/2017 2017 Penn State Journal of Law & International Affairs 5:1 agency and activity, and enable adversary activities, as well as being the primary focus of some adversary missions. U.S. strategy seems to put less emphasis to acting on information, rather, focusing on the physical elements of cyberspace.2 Concentrating on the hardware and operating systems – basically the internet – rather than other elements of cyberspace requires confronting specific operational issues. The internet is, well, the internet. Disabling or destroying hardware in one location may have transnational effects. It can raise sovereignty concerns for allies and others, and restrict the ability of the U.S. to operate, in addition to compromising intelligence equities. Perhaps most vexing though, disabling or destroying hardware raises questions of how to attribute those activities to individual actors. Engaging on content rather than infrastructure can limit these issues. To some extent the U.S. has begun to realize this, undertaking at least some discussion about engaging ISIS on both its ability to use the internet to communicate, and about changing the communications to alter the message.3 Infrastructure-focused strategy also represents a lost opportunity. Cyber operations aren’t a particularly good method for asserting national interests directly because of the ancillary effects set out above, and because they tend to be packets of boutique capabilities that don’t easily translate to large-scale operations. However, cyberspace is an ideal medium for the exercise of soft power.4 Spreading ideals of freedom of speech, economic principles, and democratically-driven culture, for example, supports U.S. national security interests. As noted below, U.S. adversaries have 2 Infra. 3 Sanger, U.S. Cyberattacks Target ISIS in a New Line of Combat, N.Y. TIMES (Apr. 24, 2016), http://www.nytimes.com/2016/04/25/us/politics/us-directs- cyberweapons-at-isis-for-first-time.html?hp&action=click&pgtype=Homepage&cl ickSource=story-heading&module=first-column-region&region=top-news&WT.na v=top-news&_r=1. 4 Soft power is the ability to get what you want through attraction and persuasion rather than coercion or payments. It arises from the attractiveness of a country’s culture, political ideals, and policies. Joseph S. Nye, Jr., Soft Power (2004) [hereinafter “Nye”], pp. 5-8. 4 DOCUMENT2 (DO NOT DELETE) 4/27/2017 2017 Brown 5:1 been more effective at using this aspect of cyber power to maximize their interests, which often run contrary to those of the U.S. The U.S. should do more to close this divide. III. RIVAL APPROACHES TO CYBERSPACE Although the U.S. is skilled in cyber activity, its focus has been on espionage and, to a lesser extent, on military activity aimed at disrupting or damaging internet infrastructure. Focusing on cyber infrastructure for non-intelligence operations has placed the U.S. behind some of its rivals in important aspects of cyberspace. Set out below are three examples of approaches to the strategic use of cyberspace that largely focus on the content rather than the infrastructure, along with suggestions regarding how the U.S. might glean lessons from each. A. China The modern Chinese economy was built on commercial espionage.5 The Chinese government has even gone so far as to formalize the strategy of stealing intellectual property to advance its economy, developing a branch of the PLA, Unit 61398, dedicated to cyber espionage. By stealing industrial secrets to advance its economic might, China is following a strategy modeled in the early days of the U.S. The U.S. has protested, but it is hard to ignore the historical irony of the situation. It was national policy in the early days of the American republic to acquire European technology by any means available, a policy that resulted in the U.S. emerging as the world’s industrial leader.6 For example, in 1789 Samuel Slater emigrated to the U.S., bringing with him an intimate knowledge of the Arkwright spinning frames that had transformed textile 5 Joshua Philipp, Hacking and Espionage Fuel China’s Growth, EPOCH TIMES (Sept. 10, 2015), http://www.theepochtimes.com/n3/1737917-investigative-report -china-theft-incorporated/. 6 Doron Ben-Atar, Trade Secrets: Intellectual Piracy and the Origins of American Industrial Power (2004); Alexander Hamilton, Report on the Subject of Manufactures (Dec. 5, 1791), http://www.constitution.org/ah/rpt_manufactures.pdf. 5 DOCUMENT2 (DO NOT DELETE) 4/27/2017 2017 Penn State Journal of Law & International Affairs
Recommended publications
  • IGC Plenary 2005
    Agenda of the Annual Meeting of the FAI Gliding Commission To be held in Lausanne, Switzerland on 5th and 6th March 2010 Agenda for the IGC Plenary 2010 Day 1, Friday 5th March 2010 Session: Opening and Reports (Friday 09.15 – 10.45) 1. Opening (Bob Henderson) 1.1 Roll Call (Stéphane Desprez/Peter Eriksen) 1.2 Administrative matters (Peter Eriksen) 1.3 Declaration of Conflicts of Interest 2. Minutes of previous meeting, Lausanne, 6th-7th March 2009 (Peter Eriksen) 3. IGC President’s report (Bob Henderson) 4. FAI Matters (Mr.Stéphane Desprez) 4.1 Update by the Secretary General 5. Finance (Dick Bradley) 5.1 2009 Financial report 5.2 Financial statement and budget 6. Reports not requiring voting 6.1 OSTIV report (Loek Boermans) Please note that reports under Agenda items 6.2, 6.3 and 6.4 are made available on the IGC web-site, and will not necessarily be presented. The Committees and Specialists will be available for questions. 6.2 Standing Committees 6.2.1 Communications and PR Report (Bob Henderson) 6.2.2 Championship Management Committee Report (Eric Mozer) 6.2.3 Sporting Code Committee Report (Ross Macintyre) 6.2.4 Air Traffic, Navigation, Display Systems (ANDS) Report (Bernald Smith) 6.2.5 GNSS Flight Recorder Approval Committee (GFAC) Report (Ian Strachan) 6.2.6 FAI Commission on Airspace and Navigation Systems (CANS) Report (Ian Strachan) Session: Reports from Specialists and Competitions (Friday 11.15 – 12.45) 6.3 Working Groups 6.3.1 Country Development Report (Alexander Georgas) 6.3.2 Grand Prix Action Plan (Bob Henderson) 6.3.3 History Committee (Tor Johannessen) 6.3.4 Scoring Working Group (Visa-Matti Leinikki) 6.4 IGC Specialists 6.4.1 CASI Report (Air Sports Commissions) (Tor Johannessen) 6.4.2 EGU/EASA Report (Patrick Pauwels) 6.4.3 Environmental Commission Report (Bernald Smith) 6.4.4 Membership (John Roake) 6.4.5 On-Line Contest Report (Axel Reich) 6.4.6 Simulated Gliding Report (Roland Stuck) 6.4.7 Trophy Management Report (Marina Vigorita) 6.4.8 Web Management Report (Peter Ryder) 7.
    [Show full text]
  • Easy Access Rules for Standardised European Rules of the Air (SERA)
    Easy Access Rules for Standardised European Rules of the Air (SERA) EASA eRules: aviation rules for the 21st century Rules and regulations are the core of the European Union civil aviation system. The aim of the EASA eRules project is to make them accessible in an efficient and reliable way to stakeholders. EASA eRules will be a comprehensive, single system for the drafting, sharing and storing of rules. It will be the single source for all aviation safety rules applicable to European airspace users. It will offer easy (online) access to all rules and regulations as well as new and innovative applications such as rulemaking process automation, stakeholder consultation, cross-referencing, and comparison with ICAO and third countries’ standards. To achieve these ambitious objectives, the EASA eRules project is structured in ten modules to cover all aviation rules and innovative functionalities. The EASA eRules system is developed and implemented in close cooperation with Member States and aviation industry to ensure that all its capabilities are relevant and effective. Published December 20201 1 The published date represents the date when the consolidated version of the document was generated. Powered by EASA eRules Page 2 of 213| Dec 2020 Easy Access Rules for Standardised European Rules Disclaimer of the Air (SERA) DISCLAIMER This version is issued by the European Aviation Safety Agency (EASA) in order to provide its stakeholders with an updated and easy-to-read publication. It has been prepared by putting together the officially published regulations with the related acceptable means of compliance and guidance material (including the amendments) adopted so far.
    [Show full text]
  • Unmanned Aircraft Systems (UAS) Tool Kit
    Unmanned Aircraft Systems (UAS) Tool Kit PREPARED BY HOGAN LOVELLS US LLP and 4C FOR THE AMERICAN FUEL & PETROCHEMICAL MANUFACTURERS TABLE OF CONTENTS Page I. INTRODUCTION ............................................................................................................. 1 II. UAS LEGAL FRAMEWORK ........................................................................................... 2 Hobbyist Use ....................................................................................................... 2 Public Use............................................................................................................ 3 Commercial / Civil Use ......................................................................................... 4 III. UAS REGISTRATION AND MARKING REQUIREMENTS ............................................. 4 IV. FAA SMALL UAS RULE (PART 107) ............................................................................. 5 Part 107 Pilot Certification Requirements ............................................................. 6 General Operating Requirements Under Part 107 ................................................ 8 UAS Requirements .............................................................................................. 9 Effect of Part 107 on Section 333 Exemptions ..................................................... 9 V. PART 107 WAIVERS & AUTHORIZATIONS ................................................................ 10 Relevant Waivers for Refiners and Petrochemical Manufacturers .....................
    [Show full text]
  • Flight Operations Pilot and Instructor Techniques For
    1 FLIGHT OPERATIONS PILOT AND INSTRUCTOR TECHNIQUES FOR OPERATIONS AND FLIGHT MANEUVERS May 9, 2017 Revision 1, July 25, 2017 Revision 2, September 28, 2018 Revision 3, September 25, 2020 2 REVISIONS Revision 1, 07/25/2017 Added Appendix 3, G1000 guide for designated pilot examiners and certified flight instructors. Revision 2, 09/28/2018 P. 25, Technique 17. Third paragraph, entitled Short field takeoff, last sentence, replace “172RG (flaps up, 63 KIAS climb)” with “Arrow.” P. 25, Technique 17. Fourth paragraph, entitled ForeFlight, delete references to IFR and delete “Exceptions.” P. 25, Technique 17. Under Instrument course stage checks, first sentence, delete “ADF and/or.” In the same section, pp.25-26, delete sentence that runs “Also, NDB holding...Instrument stage checks.” Additionally, delete “vacuum failure.” P. 35, Technique 28. First sentence, replace “172RG” with “Arrow.” P. 35, Technique 28. In paragraph ‘1’, Delete the sentence that runs “As soon as...for Vne.” P. 35, Technique 28. Delete paragraph ‘2’ and replace with the following: 2. Arrow: Begin the maneuver at 3,000’ AGL minimum at less than 129 KIAS (Vle.) Smoothly select idle power, landing gear down, bank 45 degrees, and pitch down 5 to 10 degrees nose-low, to achieve - 2,000’ per minute VSI. Do not exceed Vle. The instructor should assign a level-off altitude. The trainee is to lead the level-off and hit it within +/- 100’. Reduce speed to less than 107 KIAS prior to gear retraction. Begin recovery so as to be back in level flight by 1,500’ AGL. In turbulence, do not exceed Va, and accept whatever VSI results from that speed.
    [Show full text]
  • Collaborative En Route Airspace Management Considering Stochastic Demand, Capacity, and Weather Conditions
    Collaborative En Route Airspace Management Considering Stochastic Demand, Capacity, and Weather Conditions by Jeffrey M. Henderson A dissertation presented to the Faculty of Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Civil Engineering Dr. Antonio Trani, Chair Dr. Hojong Baik Dr. Hesham Rakha Dr. Gerardo Flintsch Dr. C. Patrick Koelling March 26, 2008 Blacksburg, Virginia Keywords: Airspace, Thunderstorms, Equity, Air Traffic Control, Simulation Copyright 2008, Jeffrey M. Henderson Collaborative En Route Airspace Management Considering Stochastic Demand, Capacity, and Weather Conditions Jeffrey M. Henderson ABSTRACT The busiest regions of airspace in the U.S. are congested during much of the day from traffic volume, weather, and other airspace restrictions. The projected growth in demand for airspace is expected to worsen this congestion while reducing system efficiency and safety. This dissertation focuses on providing methods to analyze en route airspace congestion during severe convective weather (i.e. thunderstorms) in an effort to provide more efficient aircraft routes in terms of: en route travel time, air traffic controller workload, aircraft collision potential, and equity between airlines and other airspace users. The en route airspace is generally that airspace that aircraft use between the top of climb and top of descent. Existing en route airspace flight planning models have several important limitations. These models do not appropriately consider the uncertainty in airspace demand associated with departure time prediction and en route travel time. Also, airspace capacity is typically assumed to be a static value with no adjustments for weather or other dynamic conditions that impact the air traffic controller.
    [Show full text]
  • Pilot's Guide
    250 real 7/14/98 9:31 AM Page i OWNER’S MANUAL & REFERENCE ACTV STBY GNC 250 CLR ENT CRSR SQ NRST RTE WPT NAV MSG GNC 250TM Pilot’s Guide ® 250 real 7/14/98 9:31 AM Page ii 250 real 7/14/98 9:31 AM Page i INTRODUCTION Foreword Software Version 2.06 or above © 1995 GARMIN International 9875 Widmer Road, Lenexa, KS 66215, USA Romsey House, Station Approach Romsey, Hampshire, UK S051 8DU GARMIN™, GNC 250™, Spell’N’Find™, AutoLocate™, MultiTrac8™, GPSCOM™ All rights reserved. No part of this manual may be reproduced or transmitted in any and AutoStore™ are trademarks of GARMIN form or by any means, electronic or mechanical, including photocopying and record- and may only be used with permission. ing, for any purpose without the express written permission of GARMIN. NavData® is a registered trademark of Jeppesen Sanderson, Inc. Information in this document is subject to change without notice. GARMIN reserves All rights reserved. the right to change or improve their products and to make changes in the content of this material without obligation to notify any person or organization of such changes or improvements. October 1995 190-00067-50 Rev. A Printed in USA i 250 real 7/14/98 9:31 AM Page ii INTRODUCTION Cautions CAUTION The Global Positioning System is operated by the United States government, which is solely responsible for its accuracy and maintenance. The system is subject to changes which could affect the accuracy and performance of all GPS equipment. Although the GARMIN GNC 250 is a precision electronic NAVigation AID (NAVAID), any NAVAID can be misused or misinterpreted and therefore become unsafe.
    [Show full text]
  • Real-Time Monitoring and Prediction of Airspace Safety
    NASA/TM–2015–218928 Real-Time Monitoring and Prediction of Airspace Safety Indranil Roychoudhury SGT, Inc., NASA Ames Research Center, Moffett Field, CA Lilly Spirkovska NASA Ames Research Center, Moffett Field, CA Matthew Daigle NASA Ames Research Center, Moffett Field, CA Edward Balaban NASA Ames Research Center, Moffett Field, CA Shankar Sankararaman SGT, Inc., NASA Ames Research Center, Moffett Field, CA Chetan Kulkarni SGT, Inc., NASA Ames Research Center, Moffett Field, CA Scott Poll NASA Ames Research Center, Moffett Field, CA Kai Goebel NASA Ames Research Center, Moffett Field, CA December 2015 NASA STI Program . in Profile Since its founding, NASA has been dedicated to • CONFERENCE PUBLICATION. the advancement of aeronautics and space Collected papers from scientific and technical science. The NASA Scientifi c and Technical conferences, symposia, seminars, or other Information (STI) Program plays a key part in meetings sponsored or co-sponsored by helping NASA maintain this important role. NASA. The NASA STI Program operates under the • SPECIAL PUBLICATION. Scientific, auspices of the Agency Chief Information Offi technical, or historical information from cer. It collects, organizes, provides for archiving, NASA programs, projects, and missions, often and disseminates NASA’s STI. The NASA STI concerned with subjects having substantial Program provides access to the NASA Technical public interest. Report Server—Registered (NTRS Reg) and NASA Technical Report Server— Public (NTRS) • TECHNICAL TRANSLATION. English- thus providing one of the largest collections of language translations of foreign scientific and aeronautical and space science STI in the world. technical material pertinent to NASA’s Results are published in both non-NASA mission.
    [Show full text]
  • Review of Research
    Review of ReseaRch REGULATORY CHALLENGES WITH CIVIL DRONES IN INDIA Mohd Owais Farooqui Assistant Professor of Law, School of Law, HILSR, Jamia issN: 2249-894X Hamdard University, New Delhi (India) impact factoR : 5.7631(Uif) UGc appRoved JoURNal No. 48514 ABSTRACT: volUme - 8 | issUe - 8 | may - 2019 “Drones technically called as Unmanned Aircraft System( hereafter referred as ‘UAS') are a military technology now being developed for civilian and commercial use across the globe. Drone technology has grown exponentially and the law has to contend its growth. We have reached technological breakthroughs in the form of unmanned aviation as they have reached their fullest potential and ready to be implemented for civilian applications like surveillance, nuclear-biological- chemical (NBC) sensing/tracking, traffic monitoring, flood mapping, crime investigation, police, motion picture, news and media support, cargo transportation, monitoring of sensitive sites (like Fukushima nuclear catastrophe), forests fire monitoring, etc. The manned aircraft which are globally in-use may be replaced with the unmanned aircraft due to its eco-friendly nature based on less CO2 emissions, less noise pollution etc. It has been predicted by Association of Unmanned Vehicle Systems International (AUVSI) that the global market for civilian unmanned aircraft stood at US$11.3bn in 2013 and has the potential to grow to over US$140bn in the next ten years. It further stated that 80 percent of the commercial market for drones eventually will be for agricultural uses. Thus, the emerging civil drone sector across the globe has a wide application and will have a significant impact on jobs, the economy, how business is carried out and the aviation industry.
    [Show full text]
  • FAI Sporting Code
    FAI Sporting Code Section 7 – Class O Guidelines and Templates Hang Gliders and Paragliders Classes 1 to 5 2017 Edition Effective 1st May 2017 1 FAI Sporting Code, Section 7 Guidelines and Templates - 1st May 2017 FEDERATION AERONAUTIQUE INTERNATIONALE MSI - Avenue de Rhodanie 54 — CH-1007 Lausanne — Switzerland Copyright 2017 All rights reserved. Copyright in this document is owned by the Fédération Aéronautique Internationale (FAI). Any person acting on behalf of the FAI or one of its Members is hereby authorised to copy, print, and distribute this document, subject to the following conditions: 1. The document may be used for information only and may not be exploited for commercial purposes. 2. Any copy of this document or portion thereof must include this copyright notice. 3. Regulations applicable to air law, air traffic and control in the respective countries are reserved in any event. They must be observed and, where applicable, take precedence over any sport regulations Note that any product, process or technology described in the document may be the subject of other Intellectual Property rights reserved by the Fédération Aéronautique Internationale or other entities and is not licensed hereunder. 2 FAI Sporting Code, Section 7 Guidelines and Templates - 1st May 2017 RIGHTS TO FAI INTERNATIONAL SPORTING EVENTS All international sporting events organised wholly or partly under the rules of the Fédération Aéronautique Internationale (FAI) Sporting Code1 are termed FAI International Sporting Events2. Under the FAI Statutes3, FAI owns and controls all rights relating to FAI International Sporting Events. FAI Members4 shall, within their national territories5, enforce FAI ownership of FAI International Sporting Events and require them to be registered in the FAI Sporting Calendar6.
    [Show full text]
  • Chronological List of Addresses, Speeches and Letters 1940 - 1949
    Chronological List of Addresses, Speeches and Letters 1940 - 1949 1940 - 1949 Buck, Pearl, “Address at Howard University—Fight Fascism at Home and Abroad,” June 5, 1942 Einstein, Albert, “To the United Nations…” 1947 Ickes, Harold, (Also known as: Harold LeClair Ickes, Honest Harold, Harold Le Clair Ickes) Calls for What is an American, May 18, 1941 Lewis, John L., Head of the Miners Union, Defends Coal Miners before Congress, Additional Background, April 3, 1947 Lindbergh, Charles, Defends Isolationism, April 23, 1941 Marshall, George C., “The Marshall Plan,” June 5, 1947 MacArthur, Douglas, “People of the Philippines, I Have Returned,” 1944 Oppenheimer, J. Robert, “Do not Forget Morality in the Pursuit of Scientists,” November 2, 1945 Robinson, Jackie, (Also known as: Jackie Robinson, John Roosevelt Robinson), Address to the House Un-American Activities Committee, July 18, 1949 Roosevelt, Eleanor, "Defends Civil Liberties to the ACLU", March 14, 1940 Roosevelt, Eleanor, “The Struggle for Human Rights,” September 28, 1948 Roosevelt, Franklin D., “The Arsenal of Democracy,” December 29, 1940 Roosevelt, Franklin D., “Declaration of war against Japan,” December 8, 1941 Roosevelt, Franklin D., State of the Union “Four Freedoms” Lend-Lease speech, January 6, 1941 Truman, Harry S., Radio address announcing Hiroshima bombing, August 6, 1945 Truman, Harry S., “Do-Nothing” Congress", October 7, 1948 Truman, Harry S., Address to Congress on Greece and Turkey, March 12, 1947 Source: Senator Robert Torricelli and Andrew Carroll, eds. In Our Own Words:Extraordinary Speeches of the American Century. New York: Washington Square Press Publication, 1999. Buck, Pearl, “Address at Howard University—Fight Fascism at Home and Abroad,” June 5, 1942 Nobel Laureate Pearl Buck Contends That to Defeat Fascism Abroad, Americans Must Fight for Equality at Home.
    [Show full text]
  • Silvia Panicieri* BRODSKY's
    Iperstoria – Testi Letterature Linguaggi www.iperstoria.it Rivista semestrale ISSN 2281-4582 Silvia Panicieri* BRODSKY’S “AN IMMODEST PROPOSAL:” CONTENTS AND OUTCOMES OF AN EXTRAORDINARY PROJECT 1. The Nomination as Poet Laureate Falling this year the twentieth anniversary of the death of the Russian-born poet and essayist Joseph Brodsky, it becomes particularly significant to remind one of his last commitments, somehow fallen into oblivion amongst the critics: his plan to foster literature in the United States - a project that linked him further to the social and cultural reality of his host country. Joseph Brodsky, exile in the USA since 1972, was appointed “fifth Poet Laureate Consultant in Poetry to the Library of Congress,” on 10 May 1991.1 He was the first non-American born writer to receive the highest acknowledgement in the United States. This last important public achievement came after several literary awards - the Nobel Prize for Literature in 1987 being the most prestigious one – and proved a final turning point for his work: from 1992 until his death in January 1996, he published exclusively in English.2 This paper aims at analyzing the contents of Brodsky’s “Immodest Proposal,” first presented during the speech he gave at the inaugural evening at the Library of Congress, as well as investigating the extraordinary results of the project that ensued, in the following years. In a time when the primacy of the press was not yet surpassed by electronic publications, Brodsky’s plan recounts of an extraordinary effort made in the spreading of culture, and of poetry in specific.
    [Show full text]
  • 15-0118 Gazette Nov 27 2018 ACCESS.Pdf
    Queen’s University’s newspaper of record since 1969 n queensu.ca/gazette n Nov. 27, 2018 MEMORABLE MOMENTS photos by garrett elliott Graduates, families, and friends filled Grant Hall for Fall Convocation from Nov. 13-15, making memories that will last a lifetime as six ceremonies were held and two honorary degrees were conferred by Queen’s University. MMAAKKIINNGG HHIISSTTOORRYY Two Queen’s faculty members – Dean of the Faculty of Arts and Science Barbara Crow and Professor Jonathan Rose – were members of the Advisory Council that helped select Viola Desmond for the new $10 bill campusnews queensu.ca/gazette n Nov. 27, 2018 2 A ‘noteable’ day for Queen’s professors Volume 46, number 17, 2018 BY COMMUNICATIONS STAFF ception of itself, involving wide EDITOR public consultation, for which Dr. andrew carroll The new $10 bill, featuring the Rose praised Governor of the 613-533-6459, ext. 36459 image of Viola Desmond, entered Bank of Canada Stephen Poloz [email protected] circulation on Monday, Nov. 19, (Artsci'78). Dr. Rose says the civic ASSOCIATE DIRECTOR, marking the completion of a proj- engagement around which NEWS AND PUBLICATIONS ect that involved the work of two woman should be on Canada’s peter Jeffrey Queen’s faculty members. new banknote set a precedent for 613-533-600, ext. 77491 Desmond is the first Canadian how meaningful engagement [email protected] woman to be featured on a regu- should happen, especially when larly circulating banknote. She is considering such an important ADVERTISING & SPONSORSHIP OFFICER peter gillespie best known for her refusal to ac- part of Canada’s national identity.
    [Show full text]